期刊文献+

基于混合模式的入侵检测系统研究与设计

Research and Design of Intrusion Detection System Based on Mixed Model
下载PDF
导出
摘要 关联分析和分类分析是数据挖掘的关键技术,但传统算法对入侵检测数据进行处理时有很多的不足,使用加权关联分析和核机器分类算法构造混合型入侵检测系统.设计后的系统框架分为检测客户端和检测服务端,检测客户端主要是对数据的预处理和生成检测模型;检测服务端主要是判断检测模型,进行入侵数据的二次挖掘.结果说明,该系统具有良好的入侵数据分类效果. Correlation analysis and classification is the key to technology of data mining,but traditional intrusion detection algorithm for data processing,there are many shortcomings,the use of weighted correlation analysis and kernel machine classification algorithm constructs mixed intrusion detection system.Detection system framework is divided into client and server detection.Detection of client is data preprocessing and generate testing model.Detection of service judges testing model,and processes the secondary...
作者 郑玉山
出处 《微电子学与计算机》 CSCD 北大核心 2009年第3期173-175,共3页 Microelectronics & Computer
关键词 分类分析 入侵检测 加权关联规则 核机器 混合模式 classification analysis intrusion detection weighted association rule kernel machine mixed model
  • 相关文献

参考文献1

二级参考文献11

  • 1[2]Wenke Lee.A Data Mining for Constructing Feature and Model for Intrusion Detection System[D]. Paper of the Degree of Doctor of Philosophy in the Graduate School of Arts and Sciences,COLUMBIA UNIVERSITY,1999,59-62.
  • 2[3]Wenke Lee,et al.Algorithms for Mining System Audit Data[C].Proceedings of,IEEE Symposium on Security and Privacy,1999.
  • 3[4]R Agrawal,et al.Mining Assosiation Rules Between Sets of Items in Large Database[C]. Proc. of the ACM SIGMOD Conference on Management of Data,Washington D.C.,1993.207-216.
  • 4[5]R Agrawal,et al.Mining Sequential Patterns[C].Proceedings of the 11th International Conference on Data Engineering,1995.3-10.
  • 5[6]R Agrawal,R Srikant.Mining Sequential Patterns:Generalizations and Performance Improvements[C]. Proceeding of the Fifth Int'l Conference on Extending Database Technology (EDBT),1996.3-17.
  • 6[7]R Agrawal,et al.The Quest Data Mining System[C].Proc.of the 2nd Int'l Conference on Knowledge Discovery in Databases and Data Mining,Portland,Oregon,August,1996.
  • 7[8]R Agrawal,R Srikant.Mining Generalized Assosiation Rules[C].Proceeding of the 21st Int'l Conference on Very Large Database.Zurich,Switzerland,1995.
  • 8[9]R Agrawal,et al.Fast Algorithms for Mining Association Rules[C].Proceedings of the 20th VLDB Conference,Santiago,Chile,1994.
  • 9[10]Jiawei Han,Jian Pei.Simon Fraser Sequential Pattern Mining:From Shopping History Analysis to Weblog and DNA Mining[Z].University,Canada.
  • 10胡华平,陈海涛,黄辰林,唐勇.入侵检测系统研究现状及发展趋势[J].计算机工程与科学,2001,23(2):20-25. 被引量:53

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部